![]() ![]() Maybe you’re okay with that thread model). Someone get access to your password manager, you’re totally hosed (but While youĬan stick those in your password managers, that means that should Key” that you can use as a second factor if you lose your real secondįactor (btw, always keep a backup dongle somewhere safe!). Strangers picking up your password in transit.Īlso, a note about paper keys. Pretty much useless unless your threat model only includes random (like Google Authenticator or Duo) will also work in a pinch, but Two-factor authentication, ideally with a Locally on your computer, as opposed to storing them in plain-text atįor all the web sites you care about right now. If you’re particularly paranoid, use one that encrypts the passwords ![]() The very first thing you should do, if you haven’t already, is download We’ll repeat much of the advice from those sources That has a lot of sane advice, and is decently up-to-date. Tech Solidarity has a pretty great list of do’s and don’ts for ![]() Other people who are vocal about security. One of the best ways to improve your security know-how is to follow Touch on a lot of high-level things here, but this is a process, andĮducating yourself is one of the best things you can do. There are many ways to make your technical persona more secure. Mossad, you’re probably going to have a bad time. ![]() Security mechanisms around that! If the threat model is the NSA or Find out what your threat model is, and then design your Security (and privacy) is generally all about raising the barįor attackers. Okay, maybe not, but that doesn’t mean you want to flaunt all your The world is a scary place, and everyone’s out to get you. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |